Health IT

Thousands of healthcare IT professionals compose the health IT community on BrightTALK. Learn alongside them with relevant webinars on healthcare IT compliance, big data in healthcare and IT solutions for healthcare organizations. Join the conversation by asking questions and engaging with other participants during live webinars and organized discussions.

Email is #1 source of risk in today's enterprise, yet also the #1 digital communication channel for businesses today. The United States Postal Service sends more than thirteen million emails per day, which makes their email channel and brand a high-profile target for criminal email cyberattacks. In this case study webinar, hear from Michael Ray, Inspector in Change of Revenue, Product & Cyber Security at the United States Postal Inspection Service, as he shares their story of how they implemented Agari to protect their brand and their customers against fraudulent attacks by securing their email channel.

The biggest challenge in security is no longer technology. We need to rise from recognition as security experts and experts within security teams to leaders protecting information from a world of risk and vulnerabilities.

Michael Santarcangelo cracked the code on the pathway to becoming an exceptional security leader. On July 30, 2015 at 1:00PM Eastern Michael will share the Exceptional IT Leadership Framework, including the 5 foundational elements, 9 competencies, and 5 essential habits. The webcast will explore the benefits of a framework-based, competency-driven approach to developing your leadership and how to assess where you really are in your leadership journey.

Achieving your ADME/Tox testing goals requires experience, quality data, and proper alignment with regulatory guidance. Failure to meet these important requirements can put your drug discovery and pre-clinical goals at risk.
This presentation will provide an informative overview of how you can advance and reach your pre-clinical drug discovery goals. It will discuss the importance of core contract research capabilities, including enzyme induction, enzyme inhibition, and transporter interaction. In addition, we will review new capabilities and opportunities including CYP induction and SLC transporter assay services – all designed to align with regulatory agency guidance documents.

Speaker Bio:
David Stresser is the Program Manager of Corning® Gentest℠ Contract Research Services at Corning Life Sciences since 2001, having held prior positions of Product Manager and Study Director since joining Corning in 1998. Prior to this, he was a post-doctoral associate in the laboratory of David Kupfer at the University of Massachusetts Medical School in Worcester, Massachusetts. He did his graduate work in the laboratory of David E. Williams at Oregon State University in Corvallis, Oregon receiving a Ph.D. in toxicology in 1994. Dr. Stresser has authored or co-authored 40 articles or book chapters in the field of drug metabolism and has been an invited speaker at various national and international meetings, pharmaceutical companies, and universities.

By now you've probably heard about new ransomware threats like CryptoWall, which encrypts your data and demands payment to unlock it. These threats are delivered via malicious email attachments or websites, and once they execute and connect to an external command and control server, they start to encrypt files throughout your network. Therefore, spotting infections quickly can limit the damage.

AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the hackers’ command and control server. How does it all work? Join us for a live demo that will show how AlienVault USM detects these threats quickly, saving you valuable clean up time by limiting the damage from the attack.
You'll learn:
How AlienVault USM detects communications with the command and control server
How the behavior is correlated with other signs of trouble to alert you of the threat
Immediate steps you need to take to stop the threat and limit the damage

Cell therapy is the fastest growing segment of regenerative medicine. Cell therapy is comprised of immune cell therapy and stem cell therapy, with stem cell therapy making up the largest part of this market: it is estimated that the global stem cell therapy market will reach $40 billion by 2020 and $180 billion by 2030.

Many factors determine the rate at which the stem cell therapy market advances. It is driven by the success of stem cell treatments in curing life-threatening diseases such as cancer, heart diseases and neuromuscular diseases in the worlds aging populations. In contrast, stem cell market growth rate is hindered by manufacturing and regulatory concerns. For example, if only 20% of the 318 global late stage clinical trials are approved for release on the market, there will not be enough stem cell therapy manufacturing facilities to produce the 64 resulting products. This is due, in part, to funding concerns, the high cost of build-out as well as cGMP compliance, standardization of production processes, and ever changing industry regulations.

The role of the CISO is evolving - and fast. CISOs today must find innovative ways to align with the business and strategize security as a top business asset -- and those that ascend in their role will have the opportunity to play a bigger, more influential role in the years to come. In this webinar hosted by Agari, you will hear Jim Routh, Aetna CISO share real world insights into specific challenges and solutions to approach today's evolving email threats as well as key 2018 CISO research from Chris McClean, Forrester VP of Research.

There are many decisions when choosing a video conferencing solution. Free versus subscription? Cloud solution or not? What type of video system is best suited for your meeting rooms? Join Gagan Verma, Regional Director of Lifesize, in this webinar where he will breakdown the top five considerations of video conferencing for 2015. Gagan will also elaborate on the competitive landscape and which solutions best fit your company’s needs.

Next to performance and scalability, cost efficiency is one of the top three reasons most companies cite as their motivations for acquiring storage technology. Businesses are struggling to control the storage costs, and to reduce OPEX costs for administrative staff, infrastructure and data management, and environmental and energy. Every storage vendor, it seems, including most of the Software-defined Storage purveyors, are promising ROIs that require nothing short of a suspension of disbelief.

In this presentation, Jon Toigo of the Data Management Institute digs out the root causes of high storage costs and sketches out a prescription for addressing them. He is joined by Ibrahim “Ibby” Rahmani of DataCore Software, who will address the specific cost efficiency advantages that are being realized by customers of Software-defined Storage.

Large enterprises want to use all the data they can get to earn the trust and the dollars of their customers. At the same time, they must secure this data, which is increasingly the target of sophisticated cyber-attacks. Traditional triple A (access, authentication and audit) security solutions are no longer sufficient-data-centric security must be added to the mix. In this webinar, join Stratecast | Frost & Sullivan, HP Security Voltage and (ISC)2 on July 16, 2015 at 1:00PM Eastern for an examination of ICT technology trends and business policies that have brought us to this point and how format preserving encryption can be used to protect data at rest, in motion and in use.

RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.

RNAi screening has made it possible to identify new genes, or gene networks, that are involved in a wide vari¬ety of biological processes, including assays relevant to signal transduction, cell viability, cell morphology, protein localization and function, drug resistance, and responses of host cells to pathogens. As such, RNAi continues to help us gain critical insights into the mechanisms underlying human disease and accelerate the development of treatments for cancer and a host of other disorders. The intersection between RNAi screening and complementary approaches such as CRISPR-Cas9-mediated genome editing has opened up new opportunities for assay development, screening and validation. The successful implementation of genome-editing technologies in several species suggests this will serve as an important and relevant tool for validation studies in numerous cell lines and model systems. Additionally, RNAi rescue experiments using LentiORFs serve an important role in further validating and boosting confidence of screened hits. As we continue to develop new strategies to improve genome-wide RNAi screening and validation, the significance of RNAi as a research tool will remain for many years to come.

This free webinar will summarise the results of the HFMA’s NHS Financial Temperature Check survey of UK finance directors and chief financial officers, published in early July. You will hear from Paul Briddock, HFMA Director of Technical and Policy, about the financial outlook for the NHS, the views of finance directors from 209 NHS organisations and what the HFMA thinks needs to happen to ensure the NHS can meet the financial challenges ahead.

If you’re running production workloads on Amazon Web Services, you’ve probably seen some of the limitations to AWS’ monitoring capability. HOSTING has a great solution to this! In partnership with ScienceLogic, and as part of our Unified Cloud vision, HOSTING is pleased to offer infrastructure monitoring for AWS. Join us for a live demonstration of this comprehensive alternative to AWS monitoring. We’ll review the AWS monitoring platform in terms of strengths and weaknesses, and compare it to the HOSTING offering. We’ll close with a live demonstration of our capabilities and a Q&A session.

The rapid rise of mobile computing has caused more sleepless nights for security professionals than they would care to admit. Laptops, smart phones, tablets… most employees have one of each, and each needs to be protected. What are the best strategies to enable threat prevention for your mobile workforce? What exactly are the threats being seen today, and what could be around the corner tomorrow? Join Check Point Software and (ISC)2 on July 9, 2015 at 1:00PM Eastern for a roundtable discussion on tackling mobile security challenges to keep on-the-go employees productive and your enterprise secure.

Understanding your customers is fundamental to effective communication. Current segmentation strategies draw on ever more detailed information about how patients, physicians and payers behave through the use of open source, social media and real world data. However, segmentation still lacks clear insight into why these stakeholders behave as they do – and therefore how best to change their behaviour.
Working with behavioural change experts Hamell, this one hour live discussion will look at why current segmentation strategies are failing, and the importance of understanding what drives patient or customer behaviour. Using case studies, speakers will explore how segmenting by behavioural drivers can create advanced, effective strategies to change patient, customer and payer behaviour.
This event will focus on three key areas:

•The theory behind behavioural segmentation and how it challenges the status quo
•Benefits of behavioural segmentation communication strategies and the problems answered by behavioural segmentation strategies
•Behavioural segmentation in action: practical application of this approach

The professional use of social media in healthcare is fast becoming the default way to share information, ideas, support and expertise on a global scale. Join this webinar to go beyond the basics and learn how to build a lasting community.

Informatica and HighPoint Solutions will be co-hosting a panel discussion with leading global Pharmaceutical companies where they will discuss the challenges, solutions and most importantly, how their companies can benefit from IDMP compliance.

Government funding for health and social care over the next decade is a key concern for commissioners, providers and service users. As financial and service pressures facing the NHS and local government intensify, the need for integrated care to improve people’s experience of health and care, the outcomes achieved and the efficient use of resources will only grow. On top of facing a predicted financial crisis in the NHS and local government as austerity 2.0 comes into effect, the sectors are facing significant increases in demand which could prove all but impossible to meet. What is the long view? And to what extent can a more integrated approach to managing health deal with this dilemma?

Joel Daly, Founder and EVP of Sales of HOSTING will discuss ways healthcare CIOs can leverage new business models to realize increased technology efficiencies, enable information-driven decisions and improve patient service. This session will draw upon real world case studies from Uber and the nation’s leading behavioral health organization to illustrate how healthcare CIOs can learn from other industry players to successfully meet today’s challenges including: management of data convergence, HIPAA compliance, mobile (BYOD) integration and securing protected health information (PHI) from sophisticated cyberattacks and breaches – all while meeting high patient expectations and adhering to best practices prescribed by the IHI Triple Aim.

Due to the widespread adoption and use of cloud applications, a burgeoning mobile workforce and the rise in APTs, endpoint risks have become more prevalent and a challenge to manage. Indeed, endpoint penetrations and breaches take only minutes to occur. An effective endpoint detection & response solution is critical to a timely response, as is properly trained incident response team. Join Guidance Software and (ISC)2 on August 6, 2015 at 1:00PM Eastern for a discussion on EDR and the need for effective Incident Response and automation to hasten mitigation.

This webinar will focus on operations and maintenance of the StatSpin Express 3 centrifuge. By performing simple inspections, routine maintenance and operating the centrifuges as described in this webinar, you can maximize your StatSpin Express 3 uptime and sustain your productivity.

Enterprises receive, create and store enormous amounts of email data each year: roughly 30,000 emails for every information worker, a large proportion of which contains attachments that are often sensitive or confidential. Increasingly, this information must be encrypted to ensure that data breaches are prevented and that data protection obligations are satisfied. At the same time, information must be retained for long periods in compliance with corporate, legal and regulatory obligations.

However, encryption and archiving are often at odds with one another: data that must be encrypted can be rendered difficult or impossible to access when archived. Data that is archived, but not encrypted, can be more susceptible to data breaches. As a result, the use of an integrated eDiscovery solution becomes more critical than ever. Join HP/Voltage Security and (ISC)2 on August 13, 2015 at 1:00PM Eastern to learn how to protect your enterprise communications with data-centric email encryption ands make it easy to access encrypted and archived content in support of eDiscovery, regulatory and other requirements.

WebRTC is a new technology that brings video-calling capabilities natively to the web browser, reducing friction for users who need access to such technology. Video conferencing in business is in transition from on-premise, device-based solutions to a hybrid, virtualized service. WebRTC is taking video conferencing by storm and transforming how video conferencing solutions are used across the globe.
In this webinar, you will learn what WebRTC is and what its capabilities are. We will cover five important aspects of deploying WebRTC as part of your video conferencing solution:

Abstract: Demonstrating compliance with PCI DSS is far from a trivial exercise. With the deadline for complying with the new PCI DSS 3.0 requirements coming up soon, are you sure you can document your compliance? Join us for this demo-based customer training where we will show you how to get the most out of USM for your PCI DSS compliance efforts, and your overall security posture.
We'll review:
Core USM capabilities that map to specific PCI DSS requirements
NEW PCI DSS reports added in the latest product release
Specific use cases illustrating how to use USM to ensure compliance and improve security

(ISC)² and CSA recently developed the Certified Cloud Security Professional (CCSP) credential to meet a critical market need to ensure that cloud security professionals have the required knowledge, skills and abilities to audit, assess and secure cloud infrastructures. Join Jim Reavis, CEO of Cloud Security Alliance and David Shearer, CEO, (ISC)² on August 20, 2015 at 1:00PM Eastern to learn more about the CCSP, the qualifications for it and the future of cloud security.

“Better data is everyone’s job” is a bold statement and an audacious goal for every organization. At University of Pittsburgh Medical Center (UPMC), it is precisely what drives their data governance initiative. As the largest nongovernmental employer in Pennsylvania, UPMC is committed to delivering superior medical service to its millions of patients. To achieve that goal, every piece of data could have impact on the outcome.

Join us to hear a refreshing dialogue between Terri Mikol, Director of Data Governance at UPMC, and Rob Karel, VP of Product Strategy and Marketing at Informatica, on the revolution (instead of evolution) of the data governance program at UPMC.

Their conversation will reveal:

•The business imperatives behind the data governance program
•Secrets that inspire everyone in the organization to become a data hero
•Key aspects of the data that need to be governed to ensure clean, connected and safe data is always available and fit for use

Health plans push for their members to visit their primary care provider for a checkup. It improves health outcomes and reduces the medical spend from costs related to illness and disease. Like their members, health plans also need checkups that will identify the challenges to which they are increasingly exposed, such as issues around information security, revenue maximization, and staffing needs. In this webinar, we will discuss how to specifically deal with key issues related to each of these areas.

These words were calmly stated by Commander Jim Lovell on 14 April 1970, and immortalised 25 years later in the movie Apollo 13. Lovell’s phrase has become a byword for focus. For this seminar we will draw on an analysis of the letters from Monitor addressed to Chairs. These are not letters that are welcomed. Rather, they are ones that the recipient would prefer were lost in the post.

They are sent because problems have occurred in the Foundation Trust. To paraphrase, Houston, you’ve got a problem. Having analysed these letters, we see four problem areas that Commander Lovell would wish to discuss with Chairs:

• Level of understanding among board members about their business
• Quality of information and intelligence available for decision making
• Effectiveness of non-executive director challenge
• Ability to hold executive directors to account for implementation of board decisions

This Webinar will go into each of these inter-linked areas, to see what the problem is, its impact, and what can be done about it. We’ll use a range of models that bring theory to the practice, and will draw on experience from across the NHS.

John Deffenbaugh, a director of Frontline and an NHS non-executive director, will host this Webinar.

“Time is the coin of your life. It is the only coin you have, and only you can determine how it will be spent. Be careful lest you let other people spend it for you.”
Carl Sandburg
If you google ‘Time Management Techniques’ you get 99,200,000 results. Brilliant, information at our fingertips, but no good if you have no time to find out more!
In this webinar, ‘Time Management for Human Beings,’ we distil down the very best bits and address time management from a different perspective. We believe that successful time management starts in your head with how you think. Then we need to unpick our habits, understand the nature of our workload and the culture that we’re working in. All have an influence over the way we choose to use the time that we have available.
More importantly, we’ll share with you some simple and practical approaches that will put you firmly back in control when it comes to managing your time.
In this one hour webinar……
•you’ll uncover how your thinking can help you to change your relationship with time for the better
•you’ll learn more about the impact that your workload, your habits and your organisational culture is having on your time
•you’ll discover some simple and practical approaches for boosting confidence and resilience that will have immediate implications for you in your work and life
•we’ll answer some of your burning questions about time management for human beings

Business requirements and technology trends are constantly on a change. Organizations are looking for partners who can provide solutions that are scalable and built on extensible architectures to support global needs with faster time-to-market and lower costs. Dell Application Development Maintenance and Support (ADMS) services cut across industries and verticals with expertise and capability in a host of technology platforms Microsoft, Java, Open source, Mainframe and other legacy platforms. We have partnered with niche players as well as leading vendors like Oracle, IBM and SAP in their database and platform solutions.

Attend this webinar to learn how Dell Application Development and Maintenance services can help build a scalable and growth-focussed enterprise.

Infection spread throughout healthcare facilities due to drug diversion has become a major problem, with some potentially serious long-term effects to patients. Infection from drug diversion is not a matter of “if” anymore, but “when.” In this webinar, Kim New will discuss:
•Methods diverters use that can spread infection
•Long-term impact on both the patient and the hospital
•Best practices to prevent the spread of infection and protect both the patient and your hospital

PLEASE BE SURE TO TEST YOUR SYSTEM'S COMPATIBILITY ON THE BRIGHTTALK PLATFORM PRIOR TO ATTENDING THE EVENT TO ENSURE AN OPTIMAL EXPERIENCE. SMARTPHONES MAY NOT WORK DURING THE LIVE EVENT, BUT WILL WORK IN THE RECORDED PLAYBACK MODE AFTER THE EVENT.

They may be the oldest tricks in the book, but SQL injection and cross-site scripting (XSS) attacks still put a hurt on thousands of web applications every year, impacting millions of users—your users and customers. SIEM solutions are essential in finding these exposures quickly, by collecting and correlating data to spot patterns and alert you of an attack. Join us for this demo to learn more about how these attacks work and how AlienVault USM gives you the built-in intelligence you need to spot trouble quickly.
You'll learn:
How these attacks work and what you can do to protect your network
What data you need to collect to identify the warning signs of an attack
How to identify impacted assets so you can quickly limit the damage
How AlienVault USM simplifies detection with built-in correlation rules & threat intelligence

In October 2013, the Prime Minister announced the £50 million Challenge Fund to help improve access to general practice and stimulate innovative ways of providing primary care services. Twenty pilot schemes were selected covering a wide variety of innovative ideas including extended opening hours, more ways for patients to access services and new services to better support patients with complex needs. Applications for £100 million of second wave of funding for 2015/16 have now taken place, so can we learn from some of those pilots involved in the first wave?

This workshop will introduce Corning® HepatoCells for ADME/Tox study. Derived from primary human hepatocytes, Corning HepatoCells are a renewable hepatocyte-like cell line and retain most of the physiological properties of their parental hepatocytes, such as mature hepatocyte-like morphology and induction response to prototypical inducers of CYP3A4, 1A2, and 2B6 similar to primary human hepatocytes. An overview of the characterization of Corning HepatoCells for ADME/Tox studies will be presented, along with using the model system for prediction of clinical CYP induction. The attendees will gain an understanding of the capability of Corning Hepatocyte-cells for drug ADME/Tox study.

Technology innovators will provide concepts and best practice considerations for integration. Hear their perspectives on:

- Identifying ideal solution partners based on needs and use cases specific to your organization.
- Building an information architecture framework, capable of evolving with your needs.
- Cost of ownership considerations.
- Decision Support Resources (real time, long term)